TY - GEN
T1 - A security pattern for data integrity in P2P systems
AU - Schleinzer, Benjamin
AU - Yoshioka, Nobukazu
PY - 2010
Y1 - 2010
N2 - Peer-To-Peer-systems (P2P) introduced new methods to distribute large amounts of data to end users. To increase the distribution speed resources from all participating network nodes, the peers, are used, and therefore the workload on own resources decreases. To utilize all peers large data is split into small pieces, so called chunks, and these chunks are distributed among peers therefore making each chunk available on different peers. To identify and find chunks in P2P-systems hash algorithms are used, and each peer is responsible for a specific range of the hash's keyspace and all chunks that fall within this keyspace. With data stored on multiple peers new security risks in terms of confidentiality, integrity, and availability arise. Our security pattern targeted specifically for P2P-systems helps system designers to identify possible threats and show appropriate countermeasures. We show how secure hash algorithms can guarantee the integrity of the distributed data even though chunks are sent to, received from, and stored by multiple, possible untrustworthy, peers.
AB - Peer-To-Peer-systems (P2P) introduced new methods to distribute large amounts of data to end users. To increase the distribution speed resources from all participating network nodes, the peers, are used, and therefore the workload on own resources decreases. To utilize all peers large data is split into small pieces, so called chunks, and these chunks are distributed among peers therefore making each chunk available on different peers. To identify and find chunks in P2P-systems hash algorithms are used, and each peer is responsible for a specific range of the hash's keyspace and all chunks that fall within this keyspace. With data stored on multiple peers new security risks in terms of confidentiality, integrity, and availability arise. Our security pattern targeted specifically for P2P-systems helps system designers to identify possible threats and show appropriate countermeasures. We show how secure hash algorithms can guarantee the integrity of the distributed data even though chunks are sent to, received from, and stored by multiple, possible untrustworthy, peers.
UR - http://www.scopus.com/inward/record.url?scp=84892928879&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84892928879&partnerID=8YFLogxK
U2 - 10.1145/2493288.2493305
DO - 10.1145/2493288.2493305
M3 - Conference contribution
AN - SCOPUS:84892928879
SN - 9781450301077
T3 - ACM International Conference Proceeding Series
BT - PLoP 2010 - 17th Conference on Pattern Languages of Programs, Proceedings
T2 - 17th Conference on Pattern Languages of Programs, PLoP 2010
Y2 - 16 October 2010 through 18 October 2010
ER -